Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

When you post on HN, you also do the following, right?

- Build a straw man argument

- Act like all threat models are the same (distributed vs. centralized password store, for example).



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: